incident response at scale - black hat

59
Incident Response at Scale Building a next generation SOC Omer Cohen @omercnet

Upload: tranque

Post on 14-Feb-2017

215 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Incident Response at Scale - Black Hat

Incident Response at ScaleBuilding a next generation SOC

Omer Cohen@omercnet

Page 2: Incident Response at Scale - Black Hat

Who?

● 15+ years Information Security experience

● Sr. Paranoid, Global IR Lead, Yahoo!

● Co-Founder, VP IR, IL-CERT

● ISACA CSX Task Force

● Licensed Skydiver, 996 jumps

Page 3: Incident Response at Scale - Black Hat

Security Operations Center?

Page 4: Incident Response at Scale - Black Hat

Security Operations Center in real life

http://securityreactions.tumblr.com/

Page 6: Incident Response at Scale - Black Hat

© BreachLevelIndex.com

Page 7: Incident Response at Scale - Black Hat

Majority of any given SOC shift

http://securityreactions.tumblr.com/

Page 8: Incident Response at Scale - Black Hat

Why?

Page 9: Incident Response at Scale - Black Hat
Page 10: Incident Response at Scale - Black Hat

Triaging a malware eventSIEM Alert

Page 11: Incident Response at Scale - Black Hat

Triaging a malware eventSIEM Alert ->

Analyst collects information

Page 12: Incident Response at Scale - Black Hat
Page 13: Incident Response at Scale - Black Hat
Page 14: Incident Response at Scale - Black Hat
Page 15: Incident Response at Scale - Black Hat
Page 16: Incident Response at Scale - Black Hat

Triaging a malware eventSIEM Alert ->

Analyst collects information ->

Analyst understands context

Page 17: Incident Response at Scale - Black Hat

Triaging a malware eventSIEM Alert ->

Analyst collects information ->

Analyst understands context ->

Analyst classifies incident

Page 18: Incident Response at Scale - Black Hat
Page 19: Incident Response at Scale - Black Hat
Page 20: Incident Response at Scale - Black Hat
Page 21: Incident Response at Scale - Black Hat

Triaging a malware eventSIEM Alert ->

Analyst collects information ->

Analyst understands context ->

Analyst classifies incident ->

Analyst opens ITSM re-image ticket

Page 22: Incident Response at Scale - Black Hat
Page 23: Incident Response at Scale - Black Hat
Page 24: Incident Response at Scale - Black Hat

Triaging a malware eventSIEM Alert ->

Analyst collects information ->

Analyst understands context ->

Analyst classifies incident ->

Analyst opens ITSM re-image ticket ->

System re-image

Page 25: Incident Response at Scale - Black Hat

Triaging a malware eventSIEM Alert ->

Analyst collects information ->

Analyst understands context ->

Analyst classifies incident ->

Analyst opens ITSM re-image ticket ->

System re-image ->

Incident closed

Page 26: Incident Response at Scale - Black Hat

Forensics at Scale?

Page 27: Incident Response at Scale - Black Hat
Page 28: Incident Response at Scale - Black Hat

How?

Page 29: Incident Response at Scale - Black Hat

Incident Response on a tight budget

http://securityreactions.tumblr.com/

Page 30: Incident Response at Scale - Black Hat

Better junior analysts

● Junior Analysts have a steep learning curve

● Company specific play-books

● Senior analysts focus on investigations

Page 31: Incident Response at Scale - Black Hat

Let’s automate

Page 32: Incident Response at Scale - Black Hat

Automation overkill

http://securityreactions.tumblr.com/

Page 33: Incident Response at Scale - Black Hat

Triaging a malware eventSIEM Alert

Page 34: Incident Response at Scale - Black Hat

SIEM Alert ->

Automagically collect endpoint information

Triaging a malware event

Page 35: Incident Response at Scale - Black Hat

SIEM Alert ->

Automagically collect endpoint information ->

Automagically make a decision based on BU

Triaging a malware event

Page 36: Incident Response at Scale - Black Hat

SIEM Alert ->

Automagically collect endpoint information ->

Automagically make a decision based on BU ->

Automagically classify incident

Triaging a malware event

Page 37: Incident Response at Scale - Black Hat

SIEM Alert ->

Automagically collect endpoint information ->

Automagically make a decision based on BU ->

Automagically classify incident ->

Automagically open ITSM re-image ticket

Triaging a malware event

Page 38: Incident Response at Scale - Black Hat

How your team SHOULD respond to incidents

http://securityreactions.tumblr.com/

Page 39: Incident Response at Scale - Black Hat

SIEM Alert ->

Automagically collect endpoint information ->

Automagically make a decision based on BU ->

Automagically classify incident ->

Automagically open ITSM re-image ticket ->

System re-imaged

Triaging a malware event

Page 40: Incident Response at Scale - Black Hat

SIEM Alert ->

Automagically collect endpoint information ->

Automagically make a decision based on BU ->

Automagically classify incident ->

Automagically open ITSM re-image ticket ->

System re-imaged ->

Incident closed

Triaging a malware event

Page 41: Incident Response at Scale - Black Hat
Page 42: Incident Response at Scale - Black Hat

Integrate APIs into Incident Response● Endpoint information

○ Host Asset Management○ HR Systems

Page 43: Incident Response at Scale - Black Hat

Integrate APIs into Incident Response● Endpoint information

○ Host Asset Management○ HR Systems

● IOC Lookups○ Threat Exchange○ Virus Total○ IOC Management Systems

Page 44: Incident Response at Scale - Black Hat

https://facebook.com/threatexchange

Page 45: Incident Response at Scale - Black Hat

https://github.com/facebook/ThreatExchange/

Page 46: Incident Response at Scale - Black Hat

Automatic e-Crime detection?

Page 47: Incident Response at Scale - Black Hat

Automatic e-Crime detection?

Page 48: Incident Response at Scale - Black Hat
Page 49: Incident Response at Scale - Black Hat
Page 50: Incident Response at Scale - Black Hat

Integrate APIs into Incident Response● Communications

○ STOP USING EMAIL (least for full reports)○ Incident Management Systems (not your SIEM)○ Alerts on messaging systems (IM/hipchat/slack/whatsapp/etc.)

Page 51: Incident Response at Scale - Black Hat

Integrate APIs into Incident Response● Communications

○ STOP USING EMAIL (least for full reports)○ Incident Management Systems (not your SIEM)○ Alerts on messaging systems (IM/hipchat/slack/whatsapp/etc.)

● Automate the response○ Open reimage tickets in ITSM○ Send out incident digest reports

Page 52: Incident Response at Scale - Black Hat
Page 53: Incident Response at Scale - Black Hat
Page 54: Incident Response at Scale - Black Hat
Page 55: Incident Response at Scale - Black Hat
Page 56: Incident Response at Scale - Black Hat

Benefits of automation

Page 57: Incident Response at Scale - Black Hat

Benefits of automation

Page 58: Incident Response at Scale - Black Hat

Benefits of automation

● Reduce triage time

● Reduce response time

● Ensure all tasks are completed